In Zimbra Collaboration Suite (ZCS) 8.8.15, the URL at /h/search?action accepts parameters called extra, title, and onload that are partially sanitised and lead to reflected XSS that allows executing arbitrary JavaScript on the victim's machine.
References
Link | Resource |
---|---|
https://wiki.zimbra.com/wiki/Security_Center | Patch Vendor Advisory |
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2022-08-12 15:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-37044
Mitre link : CVE-2022-37044
CVE.ORG link : CVE-2022-37044
JSON object : View
Products Affected
zimbra
- collaboration
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')